Vtome.ru - электронная библиотека

  • Добавил: alex66
  • Дата: 12-11-2018, 11:26
  • Комментариев: 0

Название: Hierarchical Neural Networks for Image Interpretation
Автор: Sven Behnke
Издательство: Springer-Verlag
Год: 2003
Формат: PDF
Страниц: 245
Для сайта: vtome.ru
Размер: 10,35 MB
Язык: English

Human performance in visual perception by far exceeds the performance of contemporary computer vision systems. While humans are able to perceive their environment almost instantly and reliably under a wide range of conditions, computer vision systems work well only under controlled conditions in limited domains.
  • Добавил: Ice Zero
  • Дата: 12-11-2018, 09:13
  • Комментариев: 0
Название: CompTIA Security+ Study Guide Authorized Courseware: Exam SY0-301
Автор: Emmett Dulaney
Издательство: Sybex
Год: 2011
Формат: PDF
Страниц: 696
Для сайта: vtome.ru
Размер: 10 Mb
Язык: English

The preparation you need for the new CompTIA Security+ exam SY0-301This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside the new, CompTIA Authorized edition, you'll find complete coverage of all Security+ exam objectives, loads of real-world examples, and a CD packed with cutting-edge exam prep tools. The book covers key exam topics such as general security concepts, infrastructure security, the basics of cryptography, and much more.
  • Добавил: Ice Zero
  • Дата: 12-11-2018, 09:09
  • Комментариев: 0
Название: CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide
Автор: Darril Gibson
Издательство: CreateSpace Independent Publishing Platform
Год: 2011
Формат: PDF
Страниц: 573
Для сайта: vtome.ru
Размер: 3.4 Mb
Язык: English

CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide is an update to the top-selling SY0-201 guide, which helped thousands of readers pass the exam the first time they took it. The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version.
  • Добавил: alex66
  • Дата: 12-11-2018, 07:19
  • Комментариев: 0

Название: Neural Networks in Healthcare: Potential And Challenges
Автор: Rezaul Begg, Joarder Kamruzzaman, Ruhul Sarker
Издательство: Idea Group Publishing
Год: 2006
Формат: PDF
Страниц: 349
Для сайта: vtome.ru
Размер: 10,92 MB
Язык: English

Neural Networks in Healthcare: Potential and Challenges presents interesting and innovative developments from leading experts and scientists working in health, biomedicine, biomedical engineering, and computing areas. This book covers many important and state-of-the-art applications in the areas of medicine and healthcare, including: cardiology, electromyography, electroencephalography, gait and human movement, therapeutic drug monitoring for patient care, sleep apnea, and computational fluid dynamics areas.
  • Добавил: alex66
  • Дата: 12-11-2018, 07:08
  • Комментариев: 0

Название: Mobile Ad Hoc Networking
Автор: Edited by Stefano Basagni, Marco Conti, Silvia Giordano, Ivan Stojmenovic
Издательство: Wiley-IEEE Press
Год: 2004
Формат: PDF
Страниц: 480
Для сайта: vtome.ru
Размер: 11.65 MB
Язык: English

From physical issues up to applications aspects, Mobile Ad Hoc Networking comprehensively covers all areas of the technology, including protocols and models, with an emphasis on the most current research and development in the rapidly growing area of ad hoc networks. All material has been carefully screened for quality and relevance and reviewed by the most renowned and involved experts in the field.
  • Добавил: Ice Zero
  • Дата: 12-11-2018, 00:05
  • Комментариев: 0
Название: Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Автор: TJ O'Connor
Издательство: Syngress
Год: 2012
Формат: PDF
Страниц: 288
Для сайта: vtome.ru
Размер: 1.5 Mb
Язык: English

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
  • Добавил: Ice Zero
  • Дата: 11-11-2018, 23:59
  • Комментариев: 0
Название: CompTIA Security+ SY0-301 Exam Cram (3rd Edition)
Автор: Kirk Hausman, Martin Weiss, Diane Barrett
Издательство: Pearson IT Certification
Год: 2011
Формат: PDF
Страниц: 552
Для сайта: vtome.ru
Размер: 3.4 Mb
Язык: English

Prepare for CompTIA Security+ SY0-301 exam success with this CompTIA Authorized Exam Cram from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner.

CompTIA® Security+ Exam Cram, Third Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for every exam topic. The book contains a set of 200 questions in two full practice exams.
  • Добавил: Ice Zero
  • Дата: 11-11-2018, 23:53
  • Комментариев: 0
Название: Social Engineering: The Art of Human Hacking
Автор: Christopher Hadnagy
Издательство: Wiley
Год: 2010
Формат: EPUB
Страниц: 410
Для сайта: vtome.ru
Размер: 6 Mb
Язык: English

The first book to reveal and dissect the technical aspect of many social engineering maneuvers
From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.
Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.
  • Добавил: literator
  • Дата: 11-11-2018, 14:37
  • Комментариев: 0
Название: The Complete Guide to Cybersecurity Risks and Controls
Автор: Charlie Pierce
Издательство: CreateSpace Independent Publishing Platform
ISBN: 1722677996
Год: 2018
Страниц: 322
Язык: английский
Формат: epub
Размер: 10.18 MB

The guide is based on the thought ICT function is a ideal government issue rather than a technical concern. With the rapid growth of protection breaches and the increasing need exterior associates to achieve business success, the effective use of ICT government and enterprise-wide frameworks to guide the execution of incorporated protection manages are critical in order to minimize data robbery. Amazingly, many companies do not have official techniques or guidelines to guard their resources from inner or exterior risks.The guide describes how to set up methodical control features and appropriate confirming techniques within a standard business structure and how to build auditable trust into the routine guarantee of ICT features.
  • Добавил: Ice Zero
  • Дата: 11-11-2018, 13:10
  • Комментариев: 0
Название: The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
Автор: Susan Young, Dave Aitel
Издательство: Auerbach Publications
Год: 2003
Формат: PDF
Страниц: 896
Для сайта: vtome.ru
Размер: 12 Mb
Язык: English

The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.